

So here we have an example of a common .ml and others of the tankie triad technique. Come in, make a big fuss about something and the evils of capital society, then bail when they get pushback, in this case even deleting the account.
So here we have an example of a common .ml and others of the tankie triad technique. Come in, make a big fuss about something and the evils of capital society, then bail when they get pushback, in this case even deleting the account.
Casting I would say is kind of a separate deal. You can still find somewhat ornate cast things today, although more often it’s injection molded plastic coated in paint.
You could do this kind of thing with wood in a CNC machine, but more often it’s just some straight cut or moulded particle board stuff with no life in it.
Given the trash that passes for furniture these days I expect that in 50 years or so people will still be hunting for stuff from the early 1900s or earlier to put into their place.
Decorative flourish for the most part. A lot of that old stuff was crafted by hand rather than a machine so it tends not to be designed for mass production.
Only if you pee in them
Some of us here think it’s backwards as well. The thing is that it’s a hard cycle to break. Because nudity is so taboo here and pretty universally related to sex rather than art or nature it ends up with any place it show up being taken as scandalous ‘uh oh, they showed the naughty bits’.
Nudes in art are viewed as high-brow, guns and violent sport as more low-brow, but we"re also a place who make icons of the blue collar ‘Joe Sixpack’ sort and for a large part treat intellectualism is snobby elitist shit.
Maybe one day we’ll unga bunga our way out of the caves, but nobody knows when.
Was the prior drive set in some kind of raid set or just individuals, and what are the old drive capacity vs new?
I guess it depends a lot on what your doing with the server. If it’s pure data store I would just boot off a USB and give yourself all the data space since it’s quite likely all running in ram anyhow.
If you run apps out of it and need the M2 for swap and rapid cache storage the fastest would likely be make a 2 drive zpool, copy a single to it, and repeat as needed until you have it all copied over, then add the 3rd to the zpool
Probably a lot more stats on it too if you look at the county recorder/assessor offices. Used to do document recording work a couple decades back and the amount of info you can get off public records for free is kind of nuts.
The guy beat you to it in 1996
I did, but mostly because I already have a bunch of stuff set up and it’s not going to change the costs any.
What you might call a stateful NAT is really a 1-1 NAT, anything going out picks up an IP and anything retuned to that IP is routed back to the single address behind the NAT. Most home users a many to one source nat so their internal devices pick up a routable IP and multiple connections to a given dest are tracked by a source port map to route return traffic to the appropriate internal host.
Basically yes to what you said, but a port forward technically is a route map inbound to a mapped IP. You could have an ACL or firewall rule to control access to the NAT but in itself the forward isn’t a true firewall allow.
Same basic result but if you trace a packet into a router without a port forward it’ll be dropped before egress rather than being truly blocked. I think where some of the contention lies is that routing between private nets you have something like:
0.0.0.0/0 > 192.168.1.1 10.0.0.0/8 > 192.168.2.1
The more specific route would send everything for 10.x to the .2 route and it would be relayed as the routing tables dictate from that device. So a NAT in that case isn’t a filter.
From a routable address to non-route 1918 address as most would have from outside in though you can’t make that jump without a map (forward) into the local subnet.
So maybe more appropriate to say a NAT ‘can’ act as a firewall, but only by virtue of losing the route rather than blocking it.
NAT in the sense used when people talk about at home is a source nat, or as we like to call it in the office space a hide address, everyone going to the adjacent net appears to be the same source IP and the system maintains a table of connections to correlate return traffic to.
The other direction though, if you where on that upstream net and tried to target traffic towards the SNAT address above the router has no idea where to send it to unless there’s a map to designate where incoming connections need to be sent on the other side of the NAT so it ends up being dropped. I suppose in theory it could try and send it to everyone in the local side net, but if you get multiple responses everything is going to get hosed up.
So from the perspective of session state initiation it can act as a firewall since without route maps it only will work from one side.
Assuming it’s not a 1-1 NAT it does make for a functional unidirectional firewall. Now, a pure router in the sense of simply offering a gateway to another subnet doesn’t do much, but the typical home router as most people think of it is creating a snat for multiple devices to reach out to the internet and without port forwarding effectively blocks off traffic from the outside in.
The model here needs tuning, it hasn’t managed to mimick coherent human language yet.
There are filtered keywords and filtered websites options on Voyager, would try playing with those.
Quit with the shilling plebbit, nobody wants an unmoderated 4chan clone.
Indeed they do use 11x but it’s still a possibility to cause issues. It’s entirely possible to manage a fleet of IPs across a net but it takes a solid plan organization plan. My company is big on the acquiring companies game where IP overlaps are a perpetual challenge when merging sites in and you need a mess of snat/dnat conversions to keep routing from getting in a knot.
While handy on a personal net, on a larger corporate net this isn’t practical and even adds a security risk. By having servers request leases you run the chance that someone gets into a segment, funds the ARP association for an IP/MAC combo and can take over a server’s spot simply by spoofing their own MAC to match at the time of lease renewal.
In the post above about setting a static address in two spots that in itself isn’t required either. So long as there are no duplicates you would just set the static address on the end device, then the network will sort it out with ARP ‘who has’ requests in local segments, or routing in the case of distinct subnets.
Edit: the duplicate I suppose could be referring to putting names into a DNS registry, in which case yes you would need that double entry, or just reference things by IP if the environment is small enough for it to be practical.
I’ve used plenty of them with no problems for years. Just so long as you have redundancy in place like a good RAID setup there’s little risk of losing anything.
Who was it that said the rule was ‘half your age + 7’, think it was from a movie or something?
It’s not too far of a gap to be an issue in general, but some places it might get legally twitchy. Here they have what they refer to as a ‘Romeo and Juliet’ law that if I recall has a sliding window of a couple years around 18 that allows for people on either side to date within some number of years.
Ethically I wouldn’t think much on it. You could well have been a single grade apart in school depending on when each birthday falls in the year, that’s hardly worth noting.